4[2]Savvides A,Park H,Srivnstava M B.The bits and flops of the N -hopmultilateration primitive for node localization problems.Proc 1st ACM Int'1 Workshop on Wireless Sensor Networks and Application,2002; 112-121
6[4]Yi S,Naldurg P,Kravets R.Security-aware ad hoc routing for wireless networks.Proc of 2001 ACM Int'l Symposium on Mobile Ad Hoc Networking and Computing,2001 ;299-302
7[5]Bell D E,Lapadula L J.Secure computer systems:mathematical foundations and model.Technical Report 1975; M74-244
9[7]Krishnamachari B,Iyengar S.Distributed Bayesian algorithms for fault-tolerance event region detection in wireless sensor networks.IEEE Transactions on Computers,2004,53 (3):241-250
10[8]Luo Xuanwen,Dong Ming,Yin lun.On distributed fault-tolerant detection in wireless sensor networks.IEEE Transactions on Computers,2006 ;55 (1):58-71
2WEI H,SASAKH,KUBOKAWA J,et al.Large scale hydro--thermal optimal power flow problems based on interior point nonlinear prOgramming [J].IEEE Transactions on Power Systems,2000,15(1):396-403.
3WEI H,SASAKI H,KUBOKAWA J,et al.An interior point nonllinear programming for optimal power flow problems with a novel data strotcture[J].IEEE Transactions on Power Systems, 1998,13(3) : 870-877.